zeronetworks / rpcfirewallLinks
☆529Updated 4 months ago
Alternatives and similar repositories for rpcfirewall
Users that are interested in rpcfirewall are comparing it to the libraries listed below
Sorting:
- A centralized resource for previously documented WDAC bypass techniques☆580Updated last month
- A repository that maps commonly used attacks using MSRPC protocols to ATT&CK☆337Updated 2 years ago
- Event Tracing For Windows (ETW) Resources☆404Updated 3 weeks ago
- Detect and respond to Cobalt Strike beacons using ETW.☆509Updated 3 years ago
- Aims to identify sleeping beacons☆633Updated 10 months ago
- ☆382Updated 2 years ago
- ☆511Updated last year
- ☆254Updated last year
- Scan installed EDRs and AVs on Windows☆598Updated 3 months ago
- RdpCacheStitcher is a tool that supports forensic analysts in reconstructing useful images out of RDP cache bitmaps.☆294Updated 2 years ago
- Sysmon EDR POC Build within Powershell to prove ability.☆226Updated 4 years ago
- Azure Outlook Command & Control (C2) - Remotely control a compromised Windows Device from your Outlook mailbox. Threat Emulation Tool for…☆489Updated 2 years ago
- Moneta is a live usermode memory analysis tool for Windows with the capability to detect malware IOCs☆780Updated last year
- ☆423Updated 3 years ago
- A C# utility for interacting with SCCM☆657Updated 2 months ago
- Extracted Yara rules from Windows Defender mpavbase and mpasbase☆466Updated 2 months ago
- ☆203Updated last year
- An effort to track security vendors' use of Microsoft's Antimalware Scan Interface☆250Updated 2 weeks ago
- Sysmon-Like research tool for ETW☆368Updated 2 years ago
- PowerShell script helping Incident Responders discover potential adversary persistence mechanisms.☆320Updated 5 months ago
- Cobalt Strike UDRL for memory scanner evasion.☆983Updated last year
- ☆1,728Updated last year
- Project for identifying executables that have command-line options that can be obfuscated, possibly bypassing detection rules.☆178Updated 9 months ago
- A PowerShell armoury for security guys and girls☆470Updated last year
- ☆589Updated 2 weeks ago
- Sysmon configuration file template with default high-quality event tracing☆521Updated last month
- C# Azure Function with an HTTP trigger that generates obfuscated PowerShell snippets that break or disable AMSI for the current process.☆421Updated last year
- A collection of tools to interact with Microsoft Security Response Center API☆107Updated last year
- ☆795Updated 2 years ago
- Checks running processes, process metadata, Dlls loaded into your current process and the each DLLs metadata, common install directories,…☆727Updated last week